NCICT-2017- National Conference on Intelligence and Communication Technology

"NCICT-2017 Conference Papers "


Secure And Efficient Node Capture Attacks Using Dispersed Data Transmission For Wireless Sensor Networks[ ]


Assurance networks are one of the essential technologies of New-generation Networks. Assurance is defined as the capability of guaranteeing functional and non-functional system properties such as dependability, security, timeliness and adaptability to heterogeneous and changing requirements. Assurance is essential for sustainable networks and this research focused specifically on providing assurance for WSNs. Node capture attacks are one prospective kind of attack on WSNs. To reduce negative effect of node capture attacks, we have previously proposed secure decentralized data transfer. In this proposed method, it was assumed that multiple paths were in place. In this paper as well, we again propose using the multipath routing method. To make multiple paths fit our previously proposed method; we have modified ATR (Augmented Tree Based Routing). We have conducted simulation experiments using our proposed method in a network simulator. The results show that our previously proposed method is effective in both cases in which the network size is small or large. In addition, we conducted other simulation experiments to measure several aspects of the assurance of our method. We measured in terms of varying parameters such as node densities, distance between the source and the destination nodes, and so on. Additionally, our method is more assured than the single path-based method

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Estimation Of Factors Affecting The Object Oriented Projects Using Vaf And Faf[ ]


The idea behind this paper includes the scope to fit for huge sized object oriented projects of automatic installation and updation of adjusted function point count.(AFPC).This concept inspire the definition of solving the complex processing of projects. It can be explained by the high phenomenon concentration of VAF (Value adjusted factor) and FAF (Final adjusted factor) i.e., the project being developed using FPC(Function point count) and enhancing it. According to Maslow’s hierarchy of needs, it suggest the self-realization, self esteem, social, safety and physiological applications. The unadjusted function point count (UFPC) is rectified with adjusted function point count (AFPC). The system includes the automatic updating of different locations – object oriented projects performance reports. The project product file and the location file is maintained by EDP(Electronic data processing).At each instance the sales file with data received is given by schematic depiction of components using FPC. We can understand the system with respect to the design structure, size and concern complexity. It is easy to substantiate the concept with more confidence of flicking the content accordingly

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study of Analysis the Data Using Big Data Tools and Technologies[ ]


Data concerns massive amount of data. The data set that include different types such as structured, unstructured and semi-structured data. This data can be generated from different sources like social media, audios, images, log files, sensor data, transactional applications, web etc. To process or analyze this huge amount of data or extracting meaningful information is a challenging task now a days. Big Data are very large data sets which are difficult to manage with ordinary data handling techniques. It exceeds the processing capability of traditional database to capture, manage, and process the voluminous amount of data. Big Data analysis is concerned with finding patterns, trends and associations hidden within .The three main characteristics of Big Data are volume, variety and velocity. In this paper first introduce the general background of big data and then focus on Hadoop platform using map reduce algorithm. Hadoop plays a major role in the IT market. It is a framework for managing the massive amount of heterogeneous data. Many leading giants such as IBM, Microsoft, Yahoo, Amazon are working with this technology. Almost 100% of the other big giants would move on to Hadoop in the upcoming years. This paper is a study of Hadoop - tools and techniques

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4g Technologies[ ]


The next stage of progression in wireless communications, after 2G and 3G,i.e the Fourth Generation wireless network consists of the new technologies with all IP based, high data rate services providing internet access anytime , anywhere, with higher bandwidth, better visual technologies and wider hold for multimedia applications. The 4G network technologies ensure high speed accessibility through any wireless device by integrating non IP based and IP based devices. This paper presents the 4G network technologies and services as a whole that the industry is confronting and eventually, unfurling some of the projected suggestions. The paper enunciates the thriving prospects of 4G ahead with technologies such as LTE, LTE Advanced, MIMO, WIMAX, WiMAX2.0 etc. This paper describes how 4G is easy to deploy and thus, cost effective as well. The idea of multimode software for maintaining different networks simultaneously is explained, along with the mechanisms of system initiated discoveries. Also, the challenge of managing user accounts is discussed. The paper describes the concept of security that should be given heed. This paper explores what 4G network technology actually is , along with some of the propositions in order to fully figure out the advantages and challenges of effectively implementing 4G.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Measuring Success of New Product Launches in the Indian Automobile Industry[ ]


The Indian auto industry, worth Rs. 3400 billion in 2016, has grown at a Compound Annual Growth Rate (CAGR) of 14 per cent over the last five years with total sales of vehicles reaching around 90 Lakhs vehicles in 2015-16. That number is likely to see a significant boost, given that the first half of 2014-15 has already witnessed a staggering growth rate of 17.12 per cent. This study deals with a critical analysis of Indian automobile industry and its growth it has shown in past years. Even though industry has been showing good growth in numbers it is more important to see whether it is really moving up the ladder. The growth it shows should be in terms of success of new product launches. So this study is to analyze the success rate of new product launches and to see whether the growth shown in Indian automobile industry is really due to new product launches and their success. Due to exhaustive nature of the industry, the study would be confined to cars only. Now the study deals with measuring success of new product launch for cars launched in the past four years. Further, short listing of some car models have been done to make the study more specific and effective. Measure.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Big Data Analysis[ ]


Big data is a term for data sets that are so large or complex that traditional data processing application software are inadequate to deal with them. Challenges include capture, storage, analysis, data curation, search, sharing, transfer, visualization, querying, updating and information privacy. The term "big data" often refers simply to the use of predictive analytics, user behavior analytics, or certain other advanced data analytics methods that extract value from data, and seldom to a particular size of data set. "There is little doubt that the quantities of data now available are indeed large, but that’s not the most relevant characteristic of this new data ecosystem." Analysis of data sets can find new correlations to "spot business trends, prevent diseases, and combat crime and so on." Scientists, business executives, practitioners of medicine, advertising and governments alike regularly meet difficulties with large data-sets in areas including Internet search, finance, urban informatics, and business informatics. Scientists encounter limitations in e-Science work, including meteorology, genomics, connectomics, complex physics simulations, biology and environmental research.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wireless Sensor Networks[ ]


Computer network is a group of computing devices like computers which are connected together and these devices communicate or exchange the information through links. One such type of network is wireless sensor networks. Wireless sensor networks.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Network Monitoring And Detecting Packets Using Packet Sniffing Method[ ]


In the past five decades computer network have kept up growing in size, complexity, overall in the number of its users as well as being in a permanent evolution. Hence the amount of network traffic flowing at each node has increased drastically. With the development and popularization of network Technology, the management, maintenance and monitoring of network is important to keep the network smooth and improve economic efficiency. So to keep a track on these nodes a packet sniffer is used. Packet sniffers are useful for analyzing network traffic over wired or wireless networks. Sometimes a packet sniffer is called a network monitor or network analyzer. Many system administrator or network administrator use it for monitoring and troubleshooting network traffic. This paper focuses on the basics of packet sniffer; it’s working Principle which used for analysis Network traffic, how it works in both switched and non switched environment, its practical approach, its positive vs negative aspects and its safe guards.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Data Mining Techniques In Agriculture Prediction Of Soil Fertility [ ]


Data Mining is emerging research field in Agriculture crop yield analysis.The techniques of data mining are extremely popular in the area of agriculture. In this paper focus on Data Mining techniques in agricultural field. Different Data Mining techniques are in use, such as K-Means,K-Nearest Neighbor (KNN), Artificial Neural Networks (ANN) and Support Vector Machines (SVM) for very recentapplications of Data Mining techniques in agriculture field. The productive capacity of a soil depends on soil fertility. Achieving and maintaining appropriate levels of soil fertility, is of utmost importance if agricultural land is to remain capable of nourishing crop production. This paper focus on the problem of predicting soil fertility andSteps for building a predictive model of soil fertility. Soil fertilityis a very important agricultural problem that remains to be solved based on the available data. The problem of soil fertilitycan be solved by employing Data Mining techniques. This paper aims at predicting soil fertility by using Different types of Data Mining techniques.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Encryption-Based Techniques For Privacy Preserving Data Mining[ ]


In present years, advances in hardware proficiency have lead to an increase in the capability to store and record personal data about consumers and individuals. This has lead to concerns that the personal data may be misused for a variety of purposes. In order to lighten these concerns, a number of techniques have newly been proposed in order to perform the data mining tasks in a privacy-preserving way. Hence privacy preservation is an important concern in data mining as secrecy of sensitive information must be maintained while sharing the data among different un-trusted parties. Privacy preserving data mining (PPDM) protects the privacy of sensitive data without losing the usability of the data. Various techniques have been introduced under PPDM to achieve this goal. This paper is to analyze and assess techniques of privacy preserving, introducing a framework based on methods of cryptography in data mining with respect to the privacy preserving. Considering the prevailing application of data mining methods in distributed databases, the suggested classification can possibly be influential in opting for a proper approach.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Dynamic Multicast Communication Towards Energy Balancing in Wireless Sensor Networks[ ]


An efficient data gathering strategy is presented using mobile sink as data collector with Clustering as sensor organizer in randomly grouped sensors in sensing field for wireless sensor network. The scheme not only extends the network lifetime through clustering process but also increase the data gathering mechanism through efficient and simplified mobile sink waving scheme. The cluster heads selection is based on both energy and data weight, which collecting all the data from the nodes within a cluster and then send it to the sink. Single mobile sink which visits the cluster heads as per defined path collects data periodically. The scheme is systemized through “Mobile Sink based Data Collection Protocol (MSDCP)” which combines energy efficient clustering and data collection method. Accordingly proposed protocol is more suitable for scenarios where sensor nodes generate variable amount of data.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Iris Based E-Voting System Using Aadhar Database[ ]


Iris based E-voting system using Aadhar database is a method for safe and secure aadhaar based electronic voting system using iris identification. Iris is one of the unique identities of a human being this is being used in the aadhar system. By using arduino software iris of every individual is being captured. The polling of the vote is transmitted to PC through arduino communication. Iris of the person captured is compared to aadhar database. We also know about individual persons full details in the personal computer. By using this method the voter will ensure if his/her vote has gone to correct candidate/party. The votes are going to be done automatically.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Preserving Data Confidentiality and Performing SQL operations on Encrypted Cloud Databases[ ]


Cloud Computing provide computation, software, data access, and storage resources without requiring cloud users to know the location and other details of the computing infrastructure. It is a technology that uses the internet and central remote servers to maintain data and applications. The main aim of this paper is to integrate cloud database service with data confidentiality and the possibility of executing concurrent operations on encrypted data i.e. to provide Secure Database as a Service (DBaaS). Here geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent SQL operations including those modifying the database structure. Data confidentiality is achieved by encrypting the data using Advance Encryption Standard (AES) algorithm. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effect Of Social Networking[ ]


Social networking is the network which is used to connect with other peoples through website such as twitter, linked, face book, YouTube through social network where the people can share their views and innovations, and people can discuss about particular issue, hopes, dreams can be shared with other people. through social network the people can do business via, olx etc…online communities represent a growing class of marketplace communities where participants can provide and exchange information on products /service or common interests in this project we develop a framework that explores the process of how a firm online community enhances consumers brand commitment key words brand commitment online communities online communities commitment, social networking.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Implication Of Data Mining In Healthcare Sector[ ]


Data Mining is the process of extracting data from data warehouse where the hidden data can be retrieved .Data Mining is used in health care for detecting the fraud and diseases of patients. By collecting the patient details such as age, sex, blood pressure and blood sugar. By analyzing the details, the health care management can predict the heart disease of patient. The plenty of details of patients can be collected and stored in data warehouse to get the instant information about particular disease of patients or patient details can be retrieved .This data mining techniques helps in effective relationship with patients by providing treatments and predicting their disease through their information .Data mining can be effective at working with huge amount of data and to determine the strategic decisions towards patients. Based on the patient details health care can provide better and efficient treatment to the patients.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Android Based Remote Control Of Pc And Pcs[ ]


Remote control system is much needed element to control and monitor device quickly. This paper implement a new design for control PCs using android mobile device. In case of mobile device, has been slight explore. It may handle software and hardware developments. An android application running a group of server program on the device, connected to network. This server client written in java and running both on desktop and web system. This android method connects through mobile device VNC.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ticket-Based Security Architecture for Achieving Obscurity and Ascribable in Mobile Ad Hoc Networks[ ]


Obscurity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Obscurity provides protection for users to enjoy network services without being traced. While Obscurity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to Connectionless mesh networks (WMNs). On the other hand, the network authority requires conditional Obscurity such that misbehaving entities in the network remain traceable. In this paper, we propose a security architecture to ensure unconditional Obscurity for honest users and Ascribable of misbehaving users for network authorities in WMNs.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ethical Hacking[ ]


Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks. Types of hacking; Website Hacking, Network Hacking, Email Hacking, Ethical Hacking Password Hacking, Computer Hacking. Hackers type; White hat hackers, Black hat hackers, Grey hat hackers, miscellaneous hackers, Red hat hacker.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Impact Of Demonetization In E-Banking[ ]


Demonetization is the act of stripping a currency unit of its status as legal tender. The opposite of remonetisationin which a form of payment is restored as legal tender. Due to demonetization it affects the people to buy necessary products for dailynecessities. Earlier only people who arehaving through knowledge about computers and electronic gadgets used to perform online mode. At the present the government is encouraging and sometimes making compulsion to perform online financial transactions. The elimination of corruption and eradication due to this demonetisation the consumer attitudes towardsthe usefulness and willingness to use Internet e banking where identified and measured. For the consumer shifting from cash transform to cashless transactions such as Paytm, debit cards and Credit Cards. And online banking user is expected to perform transactions online such as checking account balance and transforming funds between.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Seamless Access Internet using Wi fi in Dynamic Vehicles[ ]


In wireless communication, the connections will be either unstable or dynamic. Hence the connections will be easily disturbed by the interrupts like noise. Now-a-days mobile networks provide the internet connections with expensive cost. Cellular networks suffer from offloading and overloading problem due to the explosive growth of mobile users in moving vehicles. WIFI technology is used to provide the efficient internet connectivity for the moving vehicles. WIFI technology has some advantages compared with the cellular networks, such as, low cost and high peak throughput. To avoid the offloading problem and delays in the internet access over moving vehicles, the access point diversity technique is used. For example multiple access points can be fixed in the road side. When the client can enters that environment, it can communicate with the group of access point through the up link. Each access point may have different ranges. So, when the client is moving from one access point to another access point, the delays may be occurred due to the hand off technique. Hence the virtual access point is created in order to avoid the delays. Virtual access point is the one, in which all the access points are configured with the same MAC and IP address. If the transmission is succeed access point send the information to the client through the multi cast communication. Then the access points dynamically follow the client and deliver the packets.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Corporate Social Responsibility Toward Environment[ ]


Corporate citizenship is also called as corporate responsibility.CSR encourages giving a positive Impact in various field so that may have benefit on Communities, Employees, Environment and Others. CSR helps in the light of the environment protection .The main intention of CSR is to improve. The standard of living and ensuring consumer interest in promoting environmental protection.CSR will develop on its size level of diversification ,research and Development, Consumer income.CSR is an important element in strategic management.CSR is defined as the duty to cover the environmental implications, eliminate waste and emission.CSR ensure environmental sustainability, reduce child mortality, improve maternal health.CSR towards the goal of environment protection it is a private sector is becoming a decisive factor in influencing environmental performances and long term environmental sustainability

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis Research And Development Based On Software Testing Techniques And Tools.[ ]


Software testing is a process of executing a program or application with the intent of finding the software bugs and we get a zero defeat on that software. It is aimed at evaluating the source of the capability to evaluate the program. It is important to find out the software testing quality of development software in real time. There a lot of advancements have been done in formal methods, validation and verification techniques. We must checkout the software before it should handle to the customer side. There are number of testing tools here in software in based on that software testing. It is important of research and a lot of development has been made in this software testing field. A test strategy is the main of testing approach to software development cycle. Analysis and research based on the development is very essential to the software testes.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cash Less Transactions In India[ ]


Cashless society a cashless society describes an economic state whereby financial transactions are not conducted with money in the form of physical banknotes or coins, but rather through the transfer of digital information (usually an electronic representation of money) between the transacting parties. 5 Best cashless payment options in India – Go Cashless In India: E Wallets, UPI, Plastic Money, Net Banking, AEPS.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An 0verview of Disease Analysis using Association Rule Mining[ ]


Data mining is used to analysis of massive data from various sources and retrieving useful information. This information can be converted to knowledge discovery process. Today large amount of data are used to stored healthcare system. These system include doctor details, disease information, patient information.Data mining techniques are applied to the medical datasets to discover suitable analysis and comparison relating to diabetes dataset. In this paper the author is apply data mining techniques and to compare the algorithms to find out co-occurrence of disease with the help of Association rule mining and Apriori Algorithm.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study of Multimedia Visuals And Information Retrieval And Techniques[ ]


The process of retrieval of relevant information from massive collection of documents. Multimedia documents include various elements of different data types including visible and audible data type’s text images and video documents structural elements as well as interactive elements. An image contains several types of visual information which are difficult to extract. The main goal of multimedia information retrieval task using the combination of textual profiteering and image rerunning. The combination of textual and visual techniques and retrieval processes used to develop the multimedia information co retrieval system solves the problem of the semantic gap of the given image. Semantic fusion approaches are used for text based and content based image retrieval of any database. The logistic regression relevance is used to determine the images from the database. The content based retrieval image an low level ,high level visual content .image and high dimensional database in vertical search data. Then system is made to receive the user image of IR model.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Computer Networks Using the Every Aspect Of Modern Life[ ]


Computer networks run over the telephone infrastructure at relatively low cost and providing the data cost to using the connections. Networks enable international communication with suppliers and stack holders as the traffic networks. Challenges that arise in networking and particularly in the internet trend to have the millions of peoples will use the internet. On huge growing impact is the online shopping has grown over the last 10 years to become the huge market . Wireless internet technology is development also known as Wi-Fi has really taking over the way of people to access through the username and then password for that connecting the Wi-Fi, widely more popular and then very short space and the save the time. Internet connections will allows the individual access the internet via a network hotspots while travelling without using the cables and wires. Computer network technology is the high-level technology it will maintains the developing companies are also fighting against the damaging software such as the attacks the malware, virus, worms.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Data Attacks and Security Techniques in Mobile Computing[ ]


Mobile computing is the availability of cloud computing services in a mobile environment. By providing optimal services for mobile users incorporates the elements of mobile networks and cloud computing. Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage, which allows for transmission of data, voice and video. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications. Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Encryption And Decryption Scheme For Secure Routing Adhoc Network[ ]


A recent trend in accidental network routing is that the reactive on-demand philosophy wherever routes aren’t established only needed. Most of the protocols during this class aren't incorporating correct security measures. The accidental setting is accessible to each legitimate network users and malicious attackers. It’s been discovered that totally different completely different protocols want different methods for security. The key problems regarding these areas are self-addressed here. The cryptic algorithmic program has been planned during this paper. This theme will build most of the on-demand routing protocols secure. The study can facilitate in creating protocols additional study against attacks and standardize parameters for security in protocols. Accidental networks use mobile nodes to alter communication outside wireless transmission vary. Attacks on accidental network routing protocols disrupt network performance and responsibility.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Quality Of Service And Enterprises Network Design With Ipsec[ ]


Quality of Service (Quos) is that the recital level of a service accessible by the network to the user Security has been issue within the style and preparation of an enterprise network. Quality of service is that the ability to provide absolutely whole completely different fully, completely different absolutely, different totally completely different priority to different applications, users, or information flows, or to verify a precise level of performance to a data flow. The architectures supported IPSEC and shows that IPSEC will offer end-to-end security. The VPN vogue is far incontestable by connecting Cisco routers in associate extraordinarily purpose to purpose fashion employing a DTE-DCE Cable. Networks unit of menstruation setup on the routers to create a main and branch work situation with computers. During this project, a tested and secure network style is projected supported the sensible needs and projected network infrastructure is realizable with adjustable infrastructure. A stratified design of the field network is designed with differing types of security problems for making certain the standard of service.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
GPS Dementia In Vehicle Tracking And Earthquake Detection[ ]


The GPS (Global Positioning System) provides a security system for vehicle tracking which allows immediate response in case of vehicle theft, an accident, or other emergency. Tracking functions are provided through Mobile Units (GPS) installed in hidden locations in vehicles to be monitored. The Mobile Units communicate with a Control Center. General practice is widely reported in crisis. Particular concerns the recruitment and retention of doctors. An application in route choice modeling using Global Positioning System(GPS) data. Movie of wave propagation, GPS seismic displacements, rupture velocity, waveform comparisons, geological and 3D seismic structure and moment rate function. Use surface deformation measurements that includes Interferometric Synthetic Aperture Radar data acquired by ALOS-2 mission of the Japanese Aerospace Exploration and GPS data to invert for the fault geometry.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
High Availability In IP Networks Design[ ]


There is a much need of high availability on IP networks on end user perspective. Business expects zero impact during any link/node down on networking – this can be achieved with implementation of high availability on each OSI layer. So application availability to the end users can be maintained during any unnoticed outages of MAN or MPLS or local links, with zero impact. There are wide open technologies to implement high availability for applications, servers, networking. The intent of this paper is to show how to maintain/design high availability in IP networks & the network high-end technologies of it. IP network used LAN Network Design, Spanning-tree topology design, VLAN Design, VTP Design, HSRP Design, Frame Relay Design.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
RESEARCH ANALYSIS OF EFFECTIVE OF SOFTWARE REENGINEERING TECHNIQUES AND TOOLS[ ]


Software Testing is a process of finding errors while executing a program so that we get a zero defect software. It is aimed at evaluating the capability or usability of a program. Software testing is an important means of accessing quality of software. Though a lot of advancements have been done in formal methods and verification techniques, still we need software to be fully tested before it could be handled to the customer side Automatic testing tools are widely utilized to provide testing coverage metrics in order to gauge the quality of software, but these tools may have some shortcomings such as the difference among the values of code coverage metric of a given program using different code coverage tools. the ability of detect and predict poor quality of software is of major important to software engineering and reengineering, manger, quality assurance organization. Poor quality software leads to increase development cost and expensive maintenance. With so much attention on exacerbated budgetary constraints, a viable alternative is necessary. Software quality metrics designed for this purpose. Metric measure certain aspect of code or PDL representations, and can collected and use through life cycle. Automated software quality measures are important for easy integration into the software development process.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------